136 research outputs found
Unbounded violation of tripartite Bell inequalities
We prove that there are tripartite quantum states (constructed from random
unitaries) that can lead to arbitrarily large violations of Bell inequalities
for dichotomic observables. As a consequence these states can withstand an
arbitrary amount of white noise before they admit a description within a local
hidden variable model. This is in sharp contrast with the bipartite case, where
all violations are bounded by Grothendieck's constant. We will discuss the
possibility of determining the Hilbert space dimension from the obtained
violation and comment on implications for communication complexity theory.
Moreover, we show that the violation obtained from generalized GHZ states is
always bounded so that, in contrast to many other contexts, GHZ states do in
this case not lead to extremal quantum correlations. The results are based on
tools from the theories of operator spaces and tensor norms which we exploit to
prove the existence of bounded but not completely bounded trilinear forms from
commutative C*-algebras.Comment: Substantial changes in the presentation to make the paper more
accessible for a non-specialized reade
On the Complexity of Isomorphism Problems for Tensors, Groups, and Polynomials I: Tensor Isomorphism-Completeness
We study the complexity of isomorphism problems for tensors, groups, and polynomials. These problems have been studied in multivariate cryptography, machine learning, quantum information, and computational group theory. We show that these problems are all polynomial-time equivalent, creating bridges between problems traditionally studied in myriad research areas. This prompts us to define the complexity class TI, namely problems that reduce to the Tensor Isomorphism (TI) problem in polynomial time. Our main technical result is a polynomial-time reduction from d-tensor isomorphism to 3-tensor isomorphism. In the context of quantum information, this result gives multipartite-to-tripartite entanglement transformation procedure, that preserves equivalence under stochastic local operations and classical communication (SLOCC)
On the complexity of isomorphism problems for tensors, groups, and polynomials IV: linear-length reductions and their applications
Many isomorphism problems for tensors, groups, algebras, and polynomials were
recently shown to be equivalent to one another under polynomial-time
reductions, prompting the introduction of the complexity class TI (Grochow &
Qiao, ITCS '21; SIAM J. Comp., '23). Using the tensorial viewpoint, Grochow &
Qiao (CCC '21) then gave moderately exponential-time search- and
counting-to-decision reductions for a class of -groups. A significant issue
was that the reductions usually incurred a quadratic increase in the length of
the tensors involved. When the tensors represent -groups, this corresponds
to an increase in the order of the group of the form ,
negating any asymptotic gains in the Cayley table model.
In this paper, we present a new kind of tensor gadget that allows us to
replace those quadratic-length reductions with linear-length ones, yielding the
following consequences:
1. Combined with the recent breakthrough -time
isomorphism-test for -groups of class 2 and exponent (Sun, STOC '23),
our reductions extend this runtime to -groups of class and exponent
where .
2. Our reductions show that Sun's algorithm solves several TI-complete
problems over , such as isomorphism problems for cubic forms, algebras,
and tensors, in time .
3. Polynomial-time search- and counting-to-decision reduction for testing
isomorphism of -groups of class and exponent in the Cayley table
model. This answers questions of Arvind and T\'oran (Bull. EATCS, 2005) for
this group class, thought to be one of the hardest cases of Group Isomorphism.
4. If Graph Isomorphism is in P, then testing equivalence of cubic forms and
testing isomorphism of algebra over a finite field can both be solved in
time , improving from the brute-force upper bound
Cubic multivariate cryptosystems based on big field constructions and their vulnerability to a min-rank attack
In this work we analyze the security of cubic cryptographic constructions with respect to rank weakness. We detail how to extend the big field idea from quadratic to cubic, and show that the same rank defect occurs. We extend the min-rank problem and propose an algorithm to solve it in this setting. We show that for fixed small rank, the complexity is even lower than for the quadratic case. However, the rank of a cubic polynomial in n variables can be larger than n, and in this case the algorithm is very inefficient. We show that the rank of the differential is not necessarily smaller, rendering this line of attack useless if the rank is large enough. Similarly, the algebraic attack is exponential in the rank, thus useless for high rank.Resumen: En este trabajo analizamos la seguridad de construcciones criptogr´aficas c´ubicas con respecto a la debilidad del rango. Detallamos c´omo extender la idea de campo grande de cuadr´atico a c´ubico, y mostramos que la misma ca´Ĺda de rango ocurre. Extendemos el problema de rango m´Ĺnimo y proponemos un algoritmo para resolverlo en este contexto. Mostramos que para rango bajo fijo, la complejidad es incluso m´as baja que en el caso cuadr´atico. Sin embargo, el rando de un polinomio c´ubico en n variables puede ser m´as grande que n, y en este caso el algoritmo es muy ineficiente. Mostramos que el rango del diferencial no es necesariamente m´as pequeËno, lo cual vuelve in´util esta l´Ĺnea de ataque si el rango es lo suficientemente grande. Similarmente, el ataque algebr´aico es exponencial en el rango, y por lo tanto es in´util para rango alto.MaestrĂ
- âŚ